Junhua Chen

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Joint face normalization and representation learning for face recognition.
Pattern Anal. Appl., June, 2024

Design and Development of an Integrated Virtual-Reality Training Simulation Sand Table for Rail Systems.
Inf., March, 2024

A novel second-order mixture importance sampling strategy for system reliability analysis.
Qual. Reliab. Eng. Int., February, 2024

A blockchain-based scheme for edge-edge collaboration management in time-sensitive networking.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

A clustering-based automatic registration of UAV and terrestrial LiDAR forest point clouds.
Comput. Electron. Agric., 2024

2023
Distributed Logistics Resources Allocation with Blockchain, Smart Contract, and Edge Computing.
J. Circuits Syst. Comput., May, 2023

DCM-RPL: A Distributed Competition Mobility Management Scheme for RPL/6LoWPAN.
J. Circuits Syst. Comput., March, 2023

Lightweight Helmet Detection Algorithm Using an Improved YOLOv4.
Sensors, February, 2023

Dynamic reliability analysis of gear transmission system based on sparse grid numerical integration and saddle-point approximation method.
Qual. Reliab. Eng. Int., February, 2023

Mining Firm-level Uncertainty in Stock Market: A Text Mining Approach.
Proceedings of the 27th Pacific Asia Conference on Information Systems, 2023

Multi-UAV Cooperative Reconnaissance Task Allocation Based on IEPPSO Algorithm.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023

2022
Semantic Interconnection Scheme for Industrial Wireless Sensor Networks and Industrial Internet with OPC UA Pub/Sub.
Sensors, 2022

Time-dependent kinematic reliability analysis of gear mechanism based on sequential decoupling strategy and saddle-point approximation.
Reliab. Eng. Syst. Saf., 2022

International carbon financial market prediction using particle swarm optimization and support vector machine.
J. Ambient Intell. Humaniz. Comput., 2022

Class Change Prediction by Incorporating Community Smell: An Empirical Study.
Int. J. Softw. Eng. Knowl. Eng., 2022

A two stage risk assessment model based on interval-valued fuzzy numbers and risk attitudes.
Eng. Appl. Artif. Intell., 2022

Unsupervised face frontalization using disentangled representation-learning CycleGAN.
Comput. Vis. Image Underst., 2022

Safety Helmet Wearing Detection Based on A Lightweight YOLOv4 Algorithm.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

2021
Visual Saliency via Selecting and Reweighting Features in Hierarchical Fusion Network.
IEEE Signal Process. Lett., 2021

Unsupervised face Frontalization for pose-invariant face recognition.
Image Vis. Comput., 2021

Study on Customized Shuttle Transit Mode Responding to Spatiotemporal Inhomogeneous Demand in Super-Peak.
Inf., 2021

Python Code Smell Refactoring Route Generation Based on Association Rule and Correlation.
Int. J. Softw. Eng. Knowl. Eng., 2021

Multi-factor joint normalisation for face recognition in the wild.
IET Comput. Vis., 2021

2020
Learning Semantic Representations from Directed Social Links to Tag Microblog Users at Scale.
ACM Trans. Inf. Syst., 2020

Joint Multi-Patch and Multi-Task CNNs for Robust Face Recognition.
IEICE Trans. Inf. Syst., 2020

An Aggregative High-Order Singular Value Decomposition Method in Edge Computing.
IEEE Access, 2020

A Survey on Chinese as Second Language Learners' Acquisition of the Structural Auxiliary Word "de" (的).
Proceedings of the Chinese Lexical Semantics - 21st Workshop, 2020

Revisiting Alternative Experimental Settings for Evaluating Top-N Item Recommendation Algorithms.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

2019
Preference modeling by exploiting latent components of ratings.
Knowl. Inf. Syst., 2019

Dynamics and Bifurcation Analysis of a Filippov Predator-Prey Ecosystem in a Seasonally Fluctuating Environment.
Int. J. Bifurc. Chaos, 2019

Futures price prediction modeling and decision-making based on DBN deep learning.
Intell. Data Anal., 2019

The Smell of Blood: Evaluating Anemia and Bloodshot Symptoms in Web Applications.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019

A Time-compensation TDOA-based Wireless Positioning Method for Multi-level IoT Positioning.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Single-Image Super-Resolution via Multiple Matrix-Valued Kernel Regression.
Proceedings of the 2019 International Conference on Machine Learning and Cybernetics, 2019

2018
A multi-experts and multi-criteria risk assessment model for safety risks in oil and gas industry integrating risk attitudes.
Knowl. Based Syst., 2018

大规模网络总体通讯性及其效率评价分析 (Total Communication and Efficiency Analysis of Large Scale Networks).
计算机科学, 2018

基于DBN深度学习的期货市场价格预测建模与决策 (Modeling and Decision-making of Futures Market Price Prediction with DBN).
计算机科学, 2018

基于相对熵的节点影响力测量方法 (Measuring Method of Node Influence Based on Relative Entropy).
计算机科学, 2018

Piece-Wise Kernel Regression for Example-Based Super-Resolution.
Proceedings of the 2018 International Conference on Machine Learning and Cybernetics, 2018

Research on Extraction Method of Credit Risk Analysis of Corporate Bonds Based on Convolutional Neural Network.
Proceedings of the Fuzzy Systems and Data Mining IV, 2018

2017
多智能体系构架下的属性图分布式聚类算法 (Distributed and Heterogeneous Multi-agent System for Attributed Graph Clustering).
计算机科学, 2017

An Online Approach for Kernel-level Keylogger Detection and Defense.
J. Inf. Sci. Eng., 2017

A Price Driven Hazard Approach to User Retention.
CoRR, 2017

Extracting sample data based on poisson distribution.
Proceedings of the 2017 International Conference on Machine Learning and Cybernetics, 2017

2016
A Secure and Efficient Kernel Log Transfer Mechanism for Virtualization Environments.
J. Inf. Sci. Eng., 2016

A Heuristic Method of Identifying Key Microbloggers.
Proceedings of the Inclusive Smart Cities and Digital Health, 2016

2015
Frame rate up-conversion based on dual criterion motion estimation and motion vector adjustment.
Signal Image Video Process., 2015

Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2013
QoS Deployment Strategies Evaluation in PTN based Power Communication Networks.
J. Softw., 2013

2011
Research on Improving the Quality of the Normal Students by Asking the Effective Questions with Multimedia Technology in Chemistry Classroom.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2009
Research on Attack Intention Recognition Based on Graphical Model.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Modeling and Analyzing the Spread of Worms with Bilinear Incidence Rate.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2004
Advanced mirrored-pyramid broadcasting for video-on-demand.
IEEE Trans. Consumer Electron., 2004


  Loading...